f



Security Issue - Open a secured database with a different workgroup file

I have a created a secured database by following the security faq on the
Microsoft website.

I am opening my secured database logged in as one of the users that I
created using a new mdw that does not contain the Admin user in the Admins
group.  Now I am closing this secured database but not quitting ACCESS.  At
this point, I am using the File menu to open another secured database (that
uses a different mdw) and gain "full" control over its object!!!  I am using
ACCESS 2000.

Is this normal behaviour? If this is not the desired behaviour how can I
prevent it from happening?  Is the only option I have is forcing the user to
quit the application rather than close it?  Could someone please explain.
Thanks.


0
meduriv (1)
8/12/2003 3:01:36 PM
comp.databases.ms-access 42670 articles. 0 followers. Post Follow

1 Replies
690 Views

Similar Articles

[PageSpeed] 57

"budugu" <meduriv@aol.com> wrote:

> Is this normal behaviour? If this is not the desired behaviour how can
> I prevent it from happening?  Is the only option I have is forcing the
> user to quit the application rather than close it?  Could someone
> please explain. 

No, it is not normal behaviour. Access security is a very complex concept 
when you're new to it and I suspect that one or both of these apps has not 
been properly secured. It's good that you've downloaded the MS KB article, 
that's a 'must have' but can be a bit 'heavy'.  Have a look at my 
beginner's guide on my web site, it might help you track down the problem a 
little further.

HTH - Keith.
www.keithwilby.org.uk
0
keith.wilby (292)
8/12/2003 3:15:41 PM
Reply:

Similar Artilces:

Excel database query does not work after securing an Access database
Hi all, I'd appreciate if someone could give me a hint to this little annoying problem: I have a simple database that I want to be able to query from Excel. When I use the "new database query" wizard on an unsecured version of my database, everything works fine. I am able to read the tables and queries, I can build customized queries in Excel from the Access tables/queries. Now, the moment I secure my database I loose all connectiviity between Excel and Access. The wizard won't even connect to the database. When I add permission to "open/read database" object through "Users and Groups Permission" in Access, I am able to connect to the database and see all the tables/queries, but it does not show the fields. I thought that in theory if I add permissions to "read design" and "read data" to my tables and queries for the regular users that should solve the problem, but it doesn't. I am obviously missing something somewhere, but what? I searched the web but could not find anyting. I am using Windows XP Pro SP2 and Access 2003 and Excel 2003. Any advice???? Michael I'm actually just facing this problem as well myself, and have no answer. I have a secure database that's split front and backend. I've had split secure databases before where I have been able to query via excel, but for some reason, this one won't let me. ...

Connect to Security DataBase (MS Access 2000)
Hello, How can i make a connection to MS Access DB ( Security DB )? I make a new workgroupinformationfile (mdw file ), a new MS Access DB that can working with the workgroupfile. Now, i want make a connection with VBA code + DAO 3.6 from a MS Excell VBA project? How can i do that? On Sun, 8 Feb 2004 16:59:23 +0100, "Gilbert Van Hauwe" <Gilbert.VanHauwe@pi.be> wrote: Check this out: http://www.connectionstrings.com/ -Tom. >Hello, > >How can i make a connection to MS Access DB ( Security DB )? >I make a new workgroupinformationfile (mdw file ), a new MS Access DB that >can working with the workgroupfile. > >Now, i want make a connection with VBA code + DAO 3.6 from a MS Excell VBA >project? > >How can i do that? > ...

Securing a new database with an existing workgroup file
Hi, I secured a database a while back using the User-Level Security Wizard. During this process I created a new workgroup file, modified the Admins group by adding a new administrator and removing the original Admin account etc. Users opened up the database using a shortcut which pointed to the new workgroup file. Everything worked out fine. Now I wish to create a new database, with new database objects and apply the same security to it. The groups and users will be the same so I was wondering if I can use the same workgroup file to secure this database? If so how do I go about doing this? Thanks, Paul Paul, Copy your existing db, rename it to whatever name you want Delete all objects you don't use anymore (maybe there are code modules that you want to re-use) Compact and you are done. Security for the db and new objects that you are going to create will be *exactly* the same. -- Hope this helps Arno R <paulsmith5@hotmail.com> schreef in bericht news:1110817828.916172.40690@f14g2000cwb.googlegroups.com... > Hi, > > I secured a database a while back using the User-Level Security Wizard. > During this process I created a new workgroup file, modified the Admins > group by adding a new administrator and removing the original Admin > account etc. Users opened up the database using a shortcut which > pointed to the new workgroup file. Everything worked out fine. Now I > wish to create a new database, with new database objects and apply...

Problem with MS Access 97 database security
All, I recently started at a company that has a number of older MS Access 97 database applications that support production and order fulfillment. There is one database with which I have the following problems: 1) no one can make modifications to the database except by logging in using the database creator's userid and password on the workstation used by that person, who has of course left the company. Anyone else who tries to access the database, even the system administrator, gets the message "You dont have the nececssary permissions to use the xxxxxxxxx object.Have your system administrator or the person who created the object establish the appropriate permissions for you." 2) We logged in and "added" another person with the same permissions as the creator for all database objects, except we did not change the database object "ownerships", and the problem still persists. I suspect that the ownerships are the problem. Is this so? 3) I dont know anything about the restriction to a particular machine. Can anyone enlighten me on this issue? TIA JL <jliebman@kjlsoftware.com> wrote in message news:1176986756.146353.213270@e65g2000hsc.googlegroups.com... > All, > > I recently started at a company that has a number of older MS Access > 97 database applications that support production and order > fulfillment. There is one database with which I have the following > problems: > > 1) no one can make modifications ...

Problem with MS Access 97 database security #2
All, I recently started at a company that has a number of older MS Access 97 database applications that support production and order fulfillment. There is one database with which I have the following problems: 1) no one can make modifications to the database except by logging in using the database creator's userid and password on the workstation used by that person, who has of course left the company. Anyone else who tries to access the database, even the system administrator, gets the message "You dont have the nececssary permissions to use the xxxxxxxxx object.Have your system administrator or the person who created the object establish the appropriate permissions for you." 2) We logged in and "added" another person with the same permissions as the creator for all database objects, except we did not change the database object "ownerships", and the problem still persists. I suspect that the ownerships are the problem. Is this so? 3) I dont know anything about the restriction to a particular machine. Can anyone enlighten me on this issue? TIA JL ...

Access Database Security
I have a client using an mde created in 1999 by someone else, for which I don't have the original source. There is a workgroup file that accompanies the mde file. I have the user and password information required by the workgroup file. In 2004 the client requested changes. Without the source, I couldn't make the change to the mde file itself, so I wrote a small mdb that attaches tables and provides a form to fulfill the client's new requirements. I created a shortcut for the new mdb that includes the workgroup info, and for 2 years everything has worked fine. Suddenly, the client is getting permission errors whenever he attempts to access his data. He can open my tool mdb, but not the tables attached to it. As it works fine when re-installed on my desktop, I figured his copy of the workgroup file had been corrupted or overwritten. I sent him a replacement, but it didn't help. Any ideas on where the permission errors might be coming from would be greatly appreciated. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Permissions are kept in the .mdb/e file. The user name and passwords are kept in the .mdw file. Check the .mde file's Security settings (if you can). Also, if new queries have been created make sure they have the RWOP (Run With Owner Option) property set to yes (checked). Then make sure the proper user/groups have the proper permissions on those queries. -- MGFoster:::mgf00 <at> earthlink <decimal-point> net Oa...

Database Security Issues
I'm helping someone to create an online database. All is fine and good except for one problem. Here it is: In order to provide connectivity to the database, I've created a file called database.php which is readable only by the Apache web server. It contained the following: <?php function database() { $db = mysql_connect("localhost", "mtlstats", /* the password */); mysql_select_db("mtlstats", $db); return $db; } ?> I quickly realized that even though nobody could read the password from the file, there was nothing preventing the other people with accounts on my web server, from including this file into one of their own php scripts, and hijacking the database. I therefore made a change, so that it would only work when called from a file in the /mtlstats directory. The file now reads as follows: <?php function database() { if(strpos($PHP_SELF, "/mtlstats/") === 0) { $db = mysql_connect("localhost", "mtlstats", /* the password */); mysql_select_db("mtlstats", $db); return $db; } return NULL; } ?> Unfortunately, I've discovered that although $PHP_SELF normally returns the name of the file being processed by the server, when called from within a function, it returns NULL for some reason. Can anyone suggest an alternative means of correcting this problem? Any assistance w...

Securing an Access Database.
If you secure an MSACCESS Database using a Workgroup Information File WIF and then setting up permissions removing the Admin user from the its default group, repalce it with another named user, transfer all the ownership of objects to the new user. Then run the database security wizard. If after this the mdb file is placed on a different users PC which is still using the defauult system.mdw file should they still be able to open the database with full rights and permissions ? D wrote: > If you secure an MSACCESS Database using a Workgroup Information File > WIF and then setting up permissions removing the Admin user from the > its default group, repalce it with another named user, transfer all > the ownership of objects to the new user. Then run the database > security wizard. If after this the mdb file is placed on a different > users PC which is still using the defauult system.mdw file should they > still be able to open the database with full rights and permissions ? No. If they can you missed a step. -- Rick Brandt, Microsoft Access MVP Email (as appropriate) to... RBrandt at Hunter dot com Hi, David. > If after this the mdb file is placed on a different > users PC which is still using the defauult system.mdw file should they > still be able to open the database with full rights and permissions ? In many cases, yes, but only if certain vital steps were missed. To give you an idea of which steps were missed, even af...

Accessing 2 tables having same name but different databases ms-access
Hi, I have an application with MS-Access as backend and JSP/ tomcat as frontend/webserver. For getting better response time(as access is very slow compared to other RDBMS's), I have split the main DB into two DB's on different disks on my server for better performance.I have kept the table names same but changed the DB names. How do I access tables from both the DB's? This is what I have done; I made different connection to the respective DB's i.e. con and con2. When I want to access data, I am using 2 result sets for retriving data from the tables, but getting no result. Here is my code: rs2_1=stmt2_1.executeQuery("select * from Requests where Status='Released' AND LoginName='"+login+"' order by Req_No"); rs=stmt.executeQuery("select * from Requests where Status='Released' AND LoginName='"+login+"' AND Req_No> 5500 order by Req_No"); So, rs & stmt are for latest records and rs2_1 & stmt2_1 correspond the records from older DB. I think, I'm forgetting some small thing but cant get it. Please advice. What do you mean "no result"? Does "next()" return false for both rs2_1 an= d rs? If you're really trying to improve response time, you should probably be ru= nning the two queries in separate threads ... but as you acknowledge, Acces= s may not have as high performance as other RDBMSs. You would also see rel= iability adv...

Secure Access 2000 database
I have a database that contains complaint information in regards to Law Enforcement. They need to have this database secure and out of reach for all but two users. (including me, they say). In other words, the data they place in this table is higly sensitive and no one other then a few users must have access to it. If there are design changes, they would like to give me access to make the changes and they lock it down again. Suggestions on accomplishing this, including 3rd party tools, would be great. I have read a bit about encryption and it doesn't appear to be able to accomplish their request. Thanks for helping! "Annette Massie" <annettem@co.saint-croix.wi.us> wrote in message news:c67abda1.0405100404.424ca357@posting.google.com... > I have a database that contains complaint information in regards to > Law Enforcement. They need to have this database secure and out of > reach for all but two users. (including me, they say). In other words, > the data they place in this table is higly sensitive and no one other > then a few users must have access to it. If there are design changes, > they would like to give me access to make the changes and they lock it > down again. > > Suggestions on accomplishing this, including 3rd party tools, would be > great. I have read a bit about encryption and it doesn't appear to be > able to accomplish their request. > > Thanks for helping! Since an Access/Jet database is stori...

Securing Access 2000 Database
What is the best way to secure a multi-user access database? Here is the issue. Customer is wanting to allow ALL users into the database, but they only want 2 users to be able to DELETE records. I have split the database into 2 files: * Data File (Tables) * Program File (Linked Tables to Data File, queries, Forms, Reports...) User double clicks on Program File for normal use. Suggestions? I tried to implement the Security Work-group file and added the groups and got everything setup that I wanted and it worked, but then when I went to another PC to test, I was not able to login to the Database (something about Security right, I think it is trying to autologin as "admin" and it doe s not have that user in the Work-group file) Am I doing something wrong? Do I have the right approach? Please Advise. (First time trying to secure a database for multi-user system) thanks, Jeff -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Did you place the WorkGroup file (.mdw) on the other PC? It needs to be w/ all front-ends (file w/ queries, forms & reports). -- MGFoster:::mgf00 <at> earthlink <decimal-point> net Oakland, CA (USA) ** Respond only to this newsgroup. I DO NOT respond to emails ** -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBSbGo2oechKqOuFEgEQK0wwCcCFDp6dHbzaNaq0fobBylxkjf1UcAnAqN IlBdHRaRaPasC3mRG0JdIgeN =/Ohw -----END PGP SIGNATURE----- harris@compu-type.net wrote: > What is the best w...

Web access to a secure database
Can one access an secured MS Access database via the web? User Level Security is in place in this database. Any help is appreciated! Troy Might be able to access it with an ADO connection string, or download it if the location is known and hack around with it there. I'm not sure about how the mdw file secures it on a linked situation either for instance if you start a new mdb then link to one of the tables in your secured mdb. When you say secured, I assume you mean that you have the mdw file. I think that security/mdw only works when you have the file open in Access, which wouldn't be the case if one connected to it, queried sysindexes, then queried the tables... someone who knows more about those may have something to say here. BTW this is not something an ordinary Joe will do, just giving you some things to think about or research if you want. Jerry Boone jerry@antech.biz.nospam (remove .nospam before sending) President - Analytical Technologies, Inc. ASP, .NET, SQL Server Hosting http://www.antech.biz "Troy Liggins" <tliggins@earthlink.net> wrote in message news:y0Sib.53529$mQ2.40225@newsread1.news.atl.earthlink.net... > Can one access an secured MS Access database via the web? User Level > Security is in place in this database. Any help is appreciated! > > Troy > > ...

MS 2000 Secured Database
Hi. I have created a secured database which lots of my colleagues use. However when I want to make changes I can't because invariably there is somebody using it. Is there a way of either kicking everybody out or finding out who is using it, so I can go and beat them up so they get out. cheers Stephen Stephen, Your database should be split into a front end and a back end. The back end will have just the tables, the front end will have everything else, and will be linked to the tables in the back end. Each user will have a copy of the FE on his or her computer. When you make changes, make them in another copy of the FE. There are a lot of ways to distribute new versions of the FE, but the one I've used most is to write a batch file that checks to see if the user has the newest version and if not, copies it over from the file server to their computer and then starts the database. You can see a write-up of how I do this on my website at http://www.abcdataworks.com in the developers' section. Jeremy -- Jeremy Wallace Fund for the City of New York http://metrix.fcny.org Cheers Jeremy I will have a look at your site and have a play Stephen Total agreement about the splitting (I use a log-in db app to check for a new version / download and log users in... not too hot with the aule batches, me), but for a more immediate solution, take a look at the lock file - this is a file placed in the directory that the database is in, with the same name as the database b...

MS ACCESS Security issue.
Just wondering if someone knows off hand if it is possible to restrict certain forms from users and work groups and still allow access to other forms i.e. I have update accounts form but I want a form for somebody a little higher up who can create users and make the final bills etc.. But I also do not want this higher up person to have full admin privileges. I have found all the code for creating and deleting users and I have most everything in place. So the question is can I limit the forms certain users can even view and I haven't found any documentation on anything like that. Thanks You can control form permissions through code. If you view the User and Group Security option under the Tools->Security menu, you can see the available permissions for forms. These include: Open/Run Read Design Modify Design Administer Obviously, taking away the Open/Run permission would prevent a user from opening the form. The following KB articles may also be beneficial, depending on your circumstances. http://support.microsoft.com/default.aspx?scid=kb;en-us;207793 http://support.microsoft.com/default.aspx?scid=kb;en-us;179371 -- David Lloyd MCSD .NET http://LemingtonConsulting.com This response is supplied "as is" without any representations or warranties. "Yodas&" <ghostpirate7@yahoo.com> wrote in message news:1117127372.641336.34820@g14g2000cwa.googlegroups.com... Just wondering if someone knows off hand if it is possible to restrict certa...

Database Database Database Database Software Cheap
Database Database Database Database Great Datase Software See Website Below. Ultra Easy to Learn (Typically 30 Seconds) Professional Programmable Database Ver. 2.3 2.1 Million Record Capacity, (New cond). Search Rate: 2000 / Records / Second. DataBase Type: Random Access. Can Create Unlimited Databases. Programmable fields for any Application. Has Six Seperate Field Sets All Programmable. Build Time One Second, (Auto Creates DB). Setup Time: Instantly, Just Enter DB Name. Ultra Cheap Price, Special $20, Paypal Accepted. Application Mailed Instantly (file Attached Email). http://www.vehiclerepair.org/dbPro/dbpro.html ...

Database Database Database Database Software Cheap
Database Database Database Database Software Cheap Great Datase Software See Website Below. Ultra Easy to Learn (Typically 30 Seconds) Professional Programmable Database Ver. 2.3 2.1 Million Record Capacity, (New cond). Search Rate: 2000 / Records / Second. DataBase Type: Random Access. Can Create Unlimited Databases. Programmable fields for any Application. Has Six Seperate Field Sets All Programmable. Build Time One Second, (Auto Creates DB). Setup Time: Instantly, Just Enter DB Name. Ultra Cheap Price, Special $20, Paypal Accepted. Application Mailed Instantly (file Attached Email). http://www.vehiclerepair.org/dbPro/dbpro.html ...

Identifying Access Databases with tables linked from other Databases/Files
Hi, Have a number of Access Databases that I inherited and want to zip a few of them. My concern is that other active Microsoft Applications may be linking to the database or its tables. Is there a method of searching that will allow me to identify those MS Access files that are linked to. I am not really concerned with itemizing the which files link to which, but just that a link exists. Thanks in advance for any help. Bill It is easy to find the files which it links to but I don't know of any way to find the files which link to it. If you want to find the ones it links to look up the "linked table manager". If you want it the other way round I can't think of any suggestions :( <bill.brennum@grainger.com> wrote in message news:1123692126.033753.32220@o13g2000cwo.googlegroups.com... > Hi, > > Have a number of Access Databases that I inherited and want to zip a > few of them. My concern is that other active Microsoft Applications > may be linking to the database or its tables. Is there a method of > searching that will allow me to identify those MS Access files that are > linked to. I am not really concerned with itemizing the which files > link to which, but just that a link exists. > > Thanks in advance for any help. > > Bill > John, Thanks for the reply. Yeah I had the linked table manager for the databases linked to. The linked from is what I want. Bill The only way I can think of ...

Oracle DataBase and Applications Security Baseline or Security Checklist
Is there anybody out there with a Oracle DataBase 8.1.7 and Applications 11.5.8 Security Baseline or Security Checklist. Where can I get one???? Thanks in advance David In article <2lrn7tFfl47qU13@uni-berlin.de>, Dave Mendez <dhmendez@mail.cinvestav.mx> writes >Is there anybody out there with a Oracle DataBase 8.1.7 and Applications >11.5.8 Security Baseline or Security Checklist. Where can I get one???? >Thanks in advance >David > Hi, go to my website http://www.petefinnigan.com/orasec.htm - there is a section entitled "checklists" on that page - there are links to two good Oracle security check lists on there. These are database specific. If you want stuff on applications then try www.integrigy.com - Stephen Kost knows a lot about Oracle applications security and has some papers on his site. hth kind regards Pete -- Pete Finnigan email:pete@petefinnigan.com Web site: http://www.petefinnigan.com - Oracle security audit specialists Book:Oracle security step-by-step Guide - see http://store.sans.org for details. ...

Securing a split database without user level security
Hi ! I split a simple Access2K database ( shared on network )and placed the files thusly : x:\app\frontend.mdb x:\app\back\backend.mdb Problem : I once read an article that laid out a "permission" scheme that , while not perfect, was effective at providing some protection ( from outright deletion for example ). This scheme had one assign certain permissions to the mdb's and other permissions for the folders where they reside. Can anyone help on this issue ? I am not able to locate the original article nor recall it's details. Andr� in Montr�al sosandre@hotmail.com (Andy) wrote in message news:<50cf9e6a.0405180939.47d147eb@posting.google.com>... > Hi ! > I split a simple Access2K database ( shared on network )and placed > the files thusly : > > x:\app\frontend.mdb > > x:\app\back\backend.mdb > > Problem : > I once read an article that laid out a "permission" scheme that , > while not perfect, was effective at providing some protection ( from > outright deletion for example ). This scheme had one assign certain > permissions to the mdb's and other permissions for the folders where > they reside. > > Can anyone help on this issue ? > I am not able to locate the original article nor recall it's details. > > Andr� in Montr�al Why don't you want to implement User-level security? It's not that hard and is very effective. Andy wrote: > Hi ! > I split a si...

Security aspects on multiple databases VS Single databases
Hi to all, I am currently working on a project were I have to create a reservation system for a web conferencing service. I am about to chose between a multiple and a single database schema. That is each company that uses the reservation system service, either is stored in a separate database or in a single big one. Can anyone tell me -which approach is better regarding security reasons? -Which approach is better regarding data-mining? -Any other advatnages, dissadvantages except those listed allready in the group for "multiple vs single databases". Any responce will be apreciated. Thanks in advance. ...

a database, is a database, is a err database
How many times can we see the same request from someone who wants to access data from a 'pick' database through what has come to be 'standard' practices (odbc, oledb) and still get the same old sloppy ' buy this proprietary utility (and above all, my services)' answer. I think most of these pick flavors should have some sort of layer (by now!) to handle this; If someone needs to do this, the service is really 'education' i.e to show them how. Lets cut the shit now and stop with this tired and silly BS and sad marketing schlock. Regards, -Jim Jim wrote: > How many times can we see the same request from someone who wants to > access data from a 'pick' database through what has come to be > 'standard' practices (odbc, oledb) > and still get the same old sloppy ' buy this proprietary utility (and > above all, my services)' answer. I think most of these pick flavors > should have some sort of layer (by now!) to handle this; If someone > needs to do this, the service is really 'education' i.e to show them > how. Lets cut the shit now and stop with this tired and silly BS and > sad marketing schlock. > > Regards, > > -Jim Jim who? I wonder? What is this? An attack on capitalism? Providing services for those who perhaps lack the time, skill, or knowledge to perform such tasks is hardly a crime. Maybe "standard" odbc and...

how secure is the security from my security form?
Hey, I have a question about how secure the following will be.... I want to have a login form that posts to itself, so when it loads it checks if there is a username and password on the query list. If there is not, it asks for one. If there is, it checks to see if the information is valid. If it is not valid, it deletes the attributes and calls itself again. If it is valid it sets a particular session variable to be some value and redirects to the next page. Every page from there on in will check to see if the session variable is set and if not will redirect back to the login page. Are there any security risks/holes that I should know about? Thanks in advance, Aaron PS I do have access to Tomcat, but have been unable to figure out how to set it up (this is my first time setting up security for a site) - so if anyone has any tips/links that information would be most appreciated. Thanks again. ...

How secure is the security from my security form?
Hey, I have a question about how secure the following will be.... I want to have a login form that posts to itself, so when it loads it checks if there is a username and password on the query list. If there is not, it asks for one. If there is, it checks to see if the information is valid. If it is not valid, it deletes the attributes and calls itself again. If it is valid it sets a particular session variable to be some value and redirects to the next page. Every page from there on in will check to see if the session variable is set and if not will redirect back to the login page. Are ...

Import MS Office Excel Comma Separated Values Files into a MS Access 2003 database
Hi, I have been tasked with Importing MS Office Excel Comma Separated Values Files into a MS Access 2003 database. These files were exported from a DB2 database.I have also been given the DDL code. I have Googled a solution to this task and have tried creating these tables using the DDL code in a query within a blank MS Access database. Is there a more expedient way to achieve this? I noticed, for example, that a field in DB2 has a data type of "decimal" while the same field would have the data type of "number". Thanks, Zuf What follows is the DDL: -------...

database security
hi all, i'm having a play & turned on database security on a test box, as we have found that accessing the database via ODBC from a linux box connects (and allows sql updates) without specifying a username/password! i now want to turn the database security off, but when I try (from PCC), I get an error : [Pervasive][ODBC Client Interface][LNA][Pervasive][ODBC Engine Interface][Data Record Manager]This database has no security so the command has no effect. I find this a bit odd, as there are users in the Users pane, users in the X$USer table, and the security tab on the properties of the database says "Database Security: Enabled". I get a similar error if I try and delete one of the users - "This database has no security so the command has no effect." Anyone got any ideas? thanks Dave :( no one got any clues for me ? Sounds like the DDF's might be bad. Try restoring them from a backup copy with the engine shut down (which should clear the security stuff out). You can try re-enabling security right away, but I'd recommend running the Check Database Wizard against the DDF's themselves first to be sure that the DDF's are properly defined. Goldstar Software Inc. Building on Btrieve(R) for the Future(SM) Bill Bach BillBach@goldstarsoftware.com http://www.goldstarsoftware.com *** Chicago: Pervasive.SQL Service & Support - November, 2005 *** *** Chicago: Pervasive DataExchange Class - Novem...

Web resources about - Security Issue - Open a secured database with a different workgroup file - comp.databases.ms-access

U.S. attorneys ask to vacate Apple court hearing, saying FBI has found a “possible method’ to unlock ...
U.S. attorneys today asked to vacate the court hearing scheduled for tomorrow, March 22, over the Apple-FBI iPhone encryption case. The reason: ...

John Kasich Was a Dick Eight Years Ago and He's Still a Dick Today
Before John Kasich was a presidential candidate, before he was the governor of Ohio, he was a managing director at Lehman Brothers. A lot of ...

Belgian Police Name Man Suspected of Being Salah Abdeslam’s Accomplice
Najim Laachraoui was with Mr. Abdeslam, who is charged with terrorist murder over the Paris attacks, as they passed between Hungary and Austria ...

Northern Iowa Played Two Of The Tournament’s Most Exciting Games
Texas A&M’s comeback against Northern Iowa was pretty epic — like, 3,000-to-1 odds against epic. In this video, Neil Paine and Reuben Fischer-Baum ...

‘Batman V. Superman’ Targets Second Best Pre-Summer Global Opening With $350M
Finally. Thirty-two months since the project was first announced at Comic-Con , Warner Bros . Batman v. Superman: Dawn of Justice is seeing the ...

Novak Djokovic, Victoria Azarenka dominate in the desert
As competitive and exciting as Indian Wells was for 10 days, Novak Djokovic and Victoria Azarenka far exceeded expectations in Sunday's finals. ...

South Korea: Prepared for another North Korean nuclear test
A US think-tank said recent satellite images showed activity at the North's main nuclear test site that suggest a further underground detonation ...

Hulk Hogan awarded another $25M from Gawker and its founder
Gawker Media has been ordered to pay an additional $15 million to Hulk Hogan, on top of the $115 million in damages that were announced on Friday. ...

Off-Duty Chicago Police Officer Shot During Robbery Attempt
Chicago detectives are questioning a person of interest after an off-duty officer was shot in the leg during what police say was an attempted ...

Amazon Kindle critical update deadline is tomorrow
If you have a Kindle and you haven't updated it recently, your time to procrastinate has just about reached its end. The deadline for a critical ...

Resources last updated: 3/21/2016 11:12:59 PM